首页 > 最新文献

7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.最新文献

英文 中文
Optimal data replica placements in linear bus networks 线性总线网络中数据副本的最优放置
Frank Hsu, X.-D Hu, H.-J Huang, X.-H Jia
This paper discusses two optimal data replica placement problems in linear bus networks, one is to maximize data availability and the other to minimize data access cost. The optimal placements are constructed for these two problems under read-any/write-all and majority voting protocols, respectively. The obtained results show that these two problems have the same optimal solutions under read dominant, write dominant, and majority voting systems.
本文讨论了线性总线网络中两个最优数据副本放置问题,一个是数据可用性最大化,另一个是数据访问成本最小化。在任意读/全部写和多数投票协议下,分别为这两个问题构造了最优位置。结果表明,这两个问题在读支配、写支配和多数表决制度下具有相同的最优解。
{"title":"Optimal data replica placements in linear bus networks","authors":"Frank Hsu, X.-D Hu, H.-J Huang, X.-H Jia","doi":"10.1109/ISPAN.2004.1300470","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300470","url":null,"abstract":"This paper discusses two optimal data replica placement problems in linear bus networks, one is to maximize data availability and the other to minimize data access cost. The optimal placements are constructed for these two problems under read-any/write-all and majority voting protocols, respectively. The obtained results show that these two problems have the same optimal solutions under read dominant, write dominant, and majority voting systems.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":"62 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129377153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The amino acid-coupling sequence patterns in thermophilic and mesophilic proteomes 嗜热性和中温性蛋白质组氨基酸偶联序列模式
Han-Kuen Liang, Chia-Mao Huang, Jenn-Kang Hwang, M. Ko
The amino acid-coupling sequence patterns deduced from 74 mesophilic and 15 thermophilic genomes were analyzed. The amino acid-coupling sequence patterns are defined as any two types of amino acids separated apart by one or more amino acids. We found that there exists significantly different distributions of amino acid-coupling sequence patterns between thermophilic and mesophilic proteomes. For example, patterns favored to form local salt bridges (such as KX/sub n/E) are usually preferred by thermophiles; patterns containing glutamate and valine are usually favored by thermophiles, but only some of them are statistically significant; most patterns containing cysteine appear to occur more in mesophiles, but most of them are statistically insignificant except patterns like CX/sub n/P or CX/sub n/C, which is favored by thermophiles. Though previous studies based on global amino acid compositions indicate that glutamate is one of the most favored amino acids by thermophiles, we found that EX/sub n/T, EX/sub n/H and EX/sub n/Q are statistically significant patterns favored by mesophiles. We also identified sequence patterns that can effectively distinguish between thermophilic and mesophilic genomes. By combining the statistically significant amino acid-coupling sequence patterns (of lowest p-values), we find a good linear relationship between these sequence patterns and the optimal growth temperatures of the genomes.
分析了74个嗜中温型和15个嗜热型基因组的氨基酸偶联序列。氨基酸偶联序列模式定义为被一个或多个氨基酸分开的任意两种类型的氨基酸。研究发现,嗜热性和中温性蛋白质组氨基酸偶联序列模式的分布存在显著差异。例如,有利于形成局部盐桥的模式(如KX/sub n/E)通常是亲热菌的首选;含有谷氨酸和缬氨酸的模式通常受到嗜热菌的青睐,但只有其中一些具有统计显著性;除CX/sub n/P或CX/sub n/C等嗜热菌偏好的模式外,大多数含半胱氨酸的模式在嗜热菌中出现较多,但在统计学上不显著。虽然以往基于全球氨基酸组成的研究表明,谷氨酸是嗜热菌最喜欢的氨基酸之一,但我们发现EX/sub n/T、EX/sub n/H和EX/sub n/Q是嗜热菌最喜欢的氨基酸模式。我们还确定了可以有效区分嗜热性和中温性基因组的序列模式。结合统计上显著的氨基酸偶联序列模式(最低p值),我们发现这些序列模式与基因组的最佳生长温度之间存在良好的线性关系。
{"title":"The amino acid-coupling sequence patterns in thermophilic and mesophilic proteomes","authors":"Han-Kuen Liang, Chia-Mao Huang, Jenn-Kang Hwang, M. Ko","doi":"10.1109/ISPAN.2004.1300549","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300549","url":null,"abstract":"The amino acid-coupling sequence patterns deduced from 74 mesophilic and 15 thermophilic genomes were analyzed. The amino acid-coupling sequence patterns are defined as any two types of amino acids separated apart by one or more amino acids. We found that there exists significantly different distributions of amino acid-coupling sequence patterns between thermophilic and mesophilic proteomes. For example, patterns favored to form local salt bridges (such as KX/sub n/E) are usually preferred by thermophiles; patterns containing glutamate and valine are usually favored by thermophiles, but only some of them are statistically significant; most patterns containing cysteine appear to occur more in mesophiles, but most of them are statistically insignificant except patterns like CX/sub n/P or CX/sub n/C, which is favored by thermophiles. Though previous studies based on global amino acid compositions indicate that glutamate is one of the most favored amino acids by thermophiles, we found that EX/sub n/T, EX/sub n/H and EX/sub n/Q are statistically significant patterns favored by mesophiles. We also identified sequence patterns that can effectively distinguish between thermophilic and mesophilic genomes. By combining the statistically significant amino acid-coupling sequence patterns (of lowest p-values), we find a good linear relationship between these sequence patterns and the optimal growth temperatures of the genomes.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129025850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P2P-based infrastructure for efficient communication service in large scale IP networks 大规模IP网络中高效通信服务的p2p基础设施
Wei Yu
Communication service over the Internet has become an active research area, as the next generation Internet applications are requiring the integration of voice, video and data in the single IP infrastructure. In this paper, we propose a P2P-based architecture to efficiently provide communication service in large scale IP networks. By demonstrating the efficiency, two features are studied: one is the efficient communication software distribution feature and the other is the efficient conference feature.
随着下一代互联网应用要求在单一IP基础设施中集成语音、视频和数据,互联网通信服务已成为一个活跃的研究领域。为了在大规模IP网络中高效地提供通信服务,本文提出了一种基于p2p的架构。通过对效率的论证,研究了两个特征:一个是高效的通信软件分发特征,另一个是高效的会议特征。
{"title":"P2P-based infrastructure for efficient communication service in large scale IP networks","authors":"Wei Yu","doi":"10.1109/ISPAN.2004.1300530","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300530","url":null,"abstract":"Communication service over the Internet has become an active research area, as the next generation Internet applications are requiring the integration of voice, video and data in the single IP infrastructure. In this paper, we propose a P2P-based architecture to efficiently provide communication service in large scale IP networks. By demonstrating the efficiency, two features are studied: one is the efficient communication software distribution feature and the other is the efficient conference feature.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126466329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unicast routing algorithm with multiple quality-of-service parameters 具有多个服务质量参数的单播路由算法
Amarnath K. Koundinya, A. Negi, V. N. Sastry
Quality of service (QoS) is an important network service requirement to support various real time applications such as video on demand, remote-meeting systems, etc. While QoS parameters are specified by the applications it appears QoS support at routing level would be more appropriate. Here we consider an on-demand source routing modification to the Dijkstra's algorithm, which supports multi-parameter routing to find an optimal path according to the given optimality condition. The modified algorithm is analyzed with respect to its computational requirements and we prove that this algorithm finds a loop-free optimal path, if it exists.
服务质量(QoS)是支持视频点播、远程会议系统等各种实时应用的重要网络服务要求。虽然QoS参数由应用程序指定,但在路由级别支持QoS似乎更合适。本文考虑了对Dijkstra算法的按需源路由改进,该算法支持多参数路由,根据给定的最优性条件找到最优路径。对改进算法的计算需求进行了分析,证明了该算法能找到一个无环最优路径,如果该路径存在的话。
{"title":"Unicast routing algorithm with multiple quality-of-service parameters","authors":"Amarnath K. Koundinya, A. Negi, V. N. Sastry","doi":"10.1109/ISPAN.2004.1300531","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300531","url":null,"abstract":"Quality of service (QoS) is an important network service requirement to support various real time applications such as video on demand, remote-meeting systems, etc. While QoS parameters are specified by the applications it appears QoS support at routing level would be more appropriate. Here we consider an on-demand source routing modification to the Dijkstra's algorithm, which supports multi-parameter routing to find an optimal path according to the given optimality condition. The modified algorithm is analyzed with respect to its computational requirements and we prove that this algorithm finds a loop-free optimal path, if it exists.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126001141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An extended relational algebra for fuzzy multidatabases 模糊多数据库的扩展关系代数
A. Sharma, A. Goswami, D. Gupta
Recent trends in the database paradigm are to incorporate fuzzy sets to tackle imprecise and ambiguous information of real world problems. In this paper, using the concepts of fuzzy sets and possibility theory, a FTS relational model is developed to extend the TS-relational model by Ee Peng Lilm et al. (1999). The extended model integrates local fuzzy databases by merging the respective export fuzzy databases to generate a set of FTS relations of fuzzy multidatabase. A set of algebraic operations is defined to manipulate the FTS relations and their correctness is established. A set of algebraic rules is also presented to optimize FTS algebraic expressions.
数据库范式的最新趋势是结合模糊集来处理现实世界问题的不精确和模糊信息。本文利用模糊集和可能性理论的概念,Ee Peng Lilm et al.(1999)对TS-relational model进行了FTS关系模型的扩展。扩展模型通过合并各自的导出模糊数据库来集成本地模糊数据库,生成一组模糊多数据库的FTS关系。定义了一组处理FTS关系的代数运算,并证明了其正确性。提出了一套优化FTS代数表达式的代数规则。
{"title":"An extended relational algebra for fuzzy multidatabases","authors":"A. Sharma, A. Goswami, D. Gupta","doi":"10.1109/ISPAN.2004.1300520","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300520","url":null,"abstract":"Recent trends in the database paradigm are to incorporate fuzzy sets to tackle imprecise and ambiguous information of real world problems. In this paper, using the concepts of fuzzy sets and possibility theory, a FTS relational model is developed to extend the TS-relational model by Ee Peng Lilm et al. (1999). The extended model integrates local fuzzy databases by merging the respective export fuzzy databases to generate a set of FTS relations of fuzzy multidatabase. A set of algebraic operations is defined to manipulate the FTS relations and their correctness is established. A set of algebraic rules is also presented to optimize FTS algebraic expressions.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125816736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reducing connected dominating set size with multipoint relays in ad hoc wireless networks 利用多点中继减少自组织无线网络中的连接支配集大小
Xiao Chen, Jian Shen
Broadcasting is an important communication mechanism in ad hoc wireless networks. The simplest way to do broadcasting is pure flooding, in which each node retransmits a packet after receiving it, thus generates many redundant retransmissions. The rule based on dominating sets can reduce the number of retransmissions. A dominating set is a set of nodes such that any node in the network is a neighbor of some element in the set. However, computing a minimum size connected dominating set is NP hard. Several existing algorithms use the idea of multipoint relays to reduce the size of the connected dominating set. The authors of this paper observed that these algorithms can be further improved. Thus, three improvements are introduced here. It is proved that these improvements can compute a connected dominating set of the network, and simulation results show that they can further reduce the size of the dominating set. Also, extensions to power-aware broadcasting algorithms are discussed.
广播是自组织无线网络中一种重要的通信机制。最简单的广播方式是纯泛洪,即每个节点在接收到数据包后重新传输数据包,从而产生许多冗余重传。基于支配集的规则可以减少重传次数。支配集是节点的集合,使得网络中的任何节点都是集合中某个元素的邻居。然而,计算最小规模的连通支配集是NP困难的。现有的几种算法使用多点中继的思想来减小连接支配集的大小。本文作者观察到这些算法可以进一步改进。因此,这里介绍了三个改进。证明了这些改进可以计算出网络的连通支配集,仿真结果表明它们可以进一步减小支配集的大小。此外,还讨论了对功率感知广播算法的扩展。
{"title":"Reducing connected dominating set size with multipoint relays in ad hoc wireless networks","authors":"Xiao Chen, Jian Shen","doi":"10.1109/ISPAN.2004.1300534","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300534","url":null,"abstract":"Broadcasting is an important communication mechanism in ad hoc wireless networks. The simplest way to do broadcasting is pure flooding, in which each node retransmits a packet after receiving it, thus generates many redundant retransmissions. The rule based on dominating sets can reduce the number of retransmissions. A dominating set is a set of nodes such that any node in the network is a neighbor of some element in the set. However, computing a minimum size connected dominating set is NP hard. Several existing algorithms use the idea of multipoint relays to reduce the size of the connected dominating set. The authors of this paper observed that these algorithms can be further improved. Thus, three improvements are introduced here. It is proved that these improvements can compute a connected dominating set of the network, and simulation results show that they can further reduce the size of the dominating set. Also, extensions to power-aware broadcasting algorithms are discussed.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129275293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
IDR: an intrusion detection router for defending against distributed denial-of-service (DDoS) attacks IDR:用于防御分布式拒绝服务攻击的入侵检测路由器
Eric Y. K. Chan, H. Chan, K. M. Chan, Vivien P. S. Chan, S. Chanson, M. Cheung, C. Chong, Kam-pui Chow, Albert K. T. Hui, L.C.K. Hui, Luke C. K. Lam, W. C. Lau, K. Pun, Anthony Y. F. Tsang, W. Tsang, Sam C. W. Tso, D. Yeung, KY Yu
Distributed denial-of-service (DDoS) attack has turned into one of the major security threats in recent years. Usually the only solution is to stop the services or shut down the victim and then discard the attack traffic only after the DDoS attack characteristics (such as the destination ports of the attack packets) are known. In this paper, we introduce a generic DDoS attack detection mechanism as well as the design and setup of a testbed for performing experiments and analysis. Our results showed that the mechanism can detect DDoS attack. This enables us to proceed to the next steps of packet classification and traffic control.
分布式拒绝服务(DDoS)攻击已成为近年来主要的安全威胁之一。通常情况下,只有在了解DDoS攻击的特征(如攻击报文的目的端口)后,才可以停止服务或关闭攻击对象,然后丢弃攻击流量。在本文中,我们介绍了一种通用的DDoS攻击检测机制,并设计和建立了一个测试平台来进行实验和分析。实验结果表明,该机制能够检测到DDoS攻击。这使我们能够进行分组分类和流量控制的下一个步骤。
{"title":"IDR: an intrusion detection router for defending against distributed denial-of-service (DDoS) attacks","authors":"Eric Y. K. Chan, H. Chan, K. M. Chan, Vivien P. S. Chan, S. Chanson, M. Cheung, C. Chong, Kam-pui Chow, Albert K. T. Hui, L.C.K. Hui, Luke C. K. Lam, W. C. Lau, K. Pun, Anthony Y. F. Tsang, W. Tsang, Sam C. W. Tso, D. Yeung, KY Yu","doi":"10.1109/ISPAN.2004.1300541","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300541","url":null,"abstract":"Distributed denial-of-service (DDoS) attack has turned into one of the major security threats in recent years. Usually the only solution is to stop the services or shut down the victim and then discard the attack traffic only after the DDoS attack characteristics (such as the destination ports of the attack packets) are known. In this paper, we introduce a generic DDoS attack detection mechanism as well as the design and setup of a testbed for performing experiments and analysis. Our results showed that the mechanism can detect DDoS attack. This enables us to proceed to the next steps of packet classification and traffic control.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130066385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Improved upper bound for sorting by short swaps 改进了短交换排序的上界
Xuerong Feng, Z. Meng, I. H. Sudborough
We consider the problem of sorting an arbitrary permutation of length n using substring reversals of length 2 or 3. This has been called "short swaps ". We give an upper bound of (5/24) n/sup 2/ + O(nlogn), improving the previous ( 1/4 ) n/sup 2/ upper bound. We also show that there is a short swap sorting network with ( 1/4 ) n/sup 2/ +O(nlogn) comparators and depth n.
我们考虑用长度为2或3的反转子串对长度为n的任意排列排序的问题。这被称为“短期掉期”。我们给出了(5/24)n/sup 2/ + O(nlogn)的上界,改进了之前的(1/4)n/sup 2/上界。我们还展示了一个具有(1/4)n/sup 2/ +O(nlogn)比较器和深度n的短交换排序网络。
{"title":"Improved upper bound for sorting by short swaps","authors":"Xuerong Feng, Z. Meng, I. H. Sudborough","doi":"10.1109/ISPAN.2004.1300465","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300465","url":null,"abstract":"We consider the problem of sorting an arbitrary permutation of length n using substring reversals of length 2 or 3. This has been called \"short swaps \". We give an upper bound of (5/24) n/sup 2/ + O(nlogn), improving the previous ( 1/4 ) n/sup 2/ upper bound. We also show that there is a short swap sorting network with ( 1/4 ) n/sup 2/ +O(nlogn) comparators and depth n.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127523823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Peer-to-peer cooperative caching in a hybrid data delivery environment 混合数据传递环境中的点对点协作缓存
Chi-Yin Chow, H. Leong, A. Chan
In a conventional mobile environment, mobile clients retrieve data items from database servers via mobile support stations, by downloading the items over scalable broadcast channels (push-based), requesting them over shared point-to-point channels (pull-based), or making use of both types of channels to retrieve them (hybrid). Caching is a key technique for improving data retrieval performance of mobile clients, regardless of the data delivery mechanism. The emergence of robust peer-to-peer technologies now brings to reality what we call "cooperative caching" in which mobile clients can access data items from the cache in their neighboring peers, thereby adding a new dimension for data caching. This paper studies the system performance of a cooperative caching scheme, called COCA, in a hybrid data delivery environment, and proposes a cooperative cache replacement scheme, called CORE, for mobile systems. The performance of COCA and CORE schemes is evaluated through a number of simulated experiments. The experiment results show that COCA effectively improves the system performance in push-based and hybrid-data delivery environments, especially in a heavily-loaded environment. The results also indicate that CORE can further improve on the access latency and reduce the number of expensive server requests, which consume scarce pull-based bandwidth.
在传统的移动环境中,移动客户机通过移动支持站从数据库服务器检索数据项,方法是通过可扩展的广播通道(基于推送)下载数据项,通过共享的点对点通道(基于拉)请求数据项,或者利用两种类型的通道检索数据项(混合)。无论采用何种数据传递机制,缓存都是提高移动客户端数据检索性能的关键技术。健壮的点对点技术的出现现在使我们所说的“合作缓存”成为现实,在这种情况下,移动客户端可以从相邻对等点的缓存中访问数据项,从而为数据缓存增加了一个新的维度。研究了混合数据传输环境下协作缓存方案COCA的系统性能,提出了一种移动系统的协作缓存替换方案CORE。通过大量的模拟实验,对COCA和CORE方案的性能进行了评价。实验结果表明,COCA有效地提高了系统在基于推送和混合数据传输环境下的性能,特别是在高负载环境下。结果还表明,CORE可以进一步改善访问延迟,减少昂贵的服务器请求数量,这些请求消耗稀缺的基于拉的带宽。
{"title":"Peer-to-peer cooperative caching in a hybrid data delivery environment","authors":"Chi-Yin Chow, H. Leong, A. Chan","doi":"10.1109/ISPAN.2004.1300461","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300461","url":null,"abstract":"In a conventional mobile environment, mobile clients retrieve data items from database servers via mobile support stations, by downloading the items over scalable broadcast channels (push-based), requesting them over shared point-to-point channels (pull-based), or making use of both types of channels to retrieve them (hybrid). Caching is a key technique for improving data retrieval performance of mobile clients, regardless of the data delivery mechanism. The emergence of robust peer-to-peer technologies now brings to reality what we call \"cooperative caching\" in which mobile clients can access data items from the cache in their neighboring peers, thereby adding a new dimension for data caching. This paper studies the system performance of a cooperative caching scheme, called COCA, in a hybrid data delivery environment, and proposes a cooperative cache replacement scheme, called CORE, for mobile systems. The performance of COCA and CORE schemes is evaluated through a number of simulated experiments. The experiment results show that COCA effectively improves the system performance in push-based and hybrid-data delivery environments, especially in a heavily-loaded environment. The results also indicate that CORE can further improve on the access latency and reduce the number of expensive server requests, which consume scarce pull-based bandwidth.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116949961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The spanning diameter of the star graphs 星图的张成直径
Cheng-Kuan Lin, Hua-Min Huang, D. Hsu, Lih-Hsing Hsu
Assume that u and v are any two distinct vertices of different partite sets of S/sub n/ with n /spl ges/ 5. We prove that there are (n - 1) internally disjoint paths P/sub 1/, P/sub 2/, ..., P/sub n-i/ joining u to v such that /spl cup//sup n = 1//sub i = 2/ P/sub i/ spans S/sub n/ and l(P/sub i/) /spl les/ (n - 1)! + 2(n - 2)! + 2(n - 3)! + 1 = n!/(n - 2) + 1. We also prove that there are two internally disjoint paths Q/sub 1/ and Q/sub 2/ joining u to v such that Q/sub 1/ /spl cup/ Q/sub 2/ spans S/sub n/ and l(Q/sub i/) /spl les/ n!/2 + l for i = 1,2.
设u和v是S/sub n/的n/ spl ges/ 5的不同部集的任意两个不同的顶点。我们证明了存在(n - 1)条内部不相交路径P/下标1/,P/下标2/,…, P/下标n-i/将u与v连接,使得/spl cup//sup n = 1//下标i = 2/ P/下标i/跨出S/下标n/和l(P/下标i/) /spl les/ (n - 1)!+ 2(n - 2)!+ 2(n - 3)!+ 1 = n!/(n - 2) + 1。我们还证明了有两条内部不相交的路径Q/下标1/和Q/下标2/连接u和v,使得Q/下标1/ /spl cup/ Q/下标2/跨越S/下标n/和l(Q/下标i/) /spl les/ n!/2 + l对于I = 1,2。
{"title":"The spanning diameter of the star graphs","authors":"Cheng-Kuan Lin, Hua-Min Huang, D. Hsu, Lih-Hsing Hsu","doi":"10.1109/ISPAN.2004.1300536","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300536","url":null,"abstract":"Assume that u and v are any two distinct vertices of different partite sets of S/sub n/ with n /spl ges/ 5. We prove that there are (n - 1) internally disjoint paths P/sub 1/, P/sub 2/, ..., P/sub n-i/ joining u to v such that /spl cup//sup n = 1//sub i = 2/ P/sub i/ spans S/sub n/ and l(P/sub i/) /spl les/ (n - 1)! + 2(n - 2)! + 2(n - 3)! + 1 = n!/(n - 2) + 1. We also prove that there are two internally disjoint paths Q/sub 1/ and Q/sub 2/ joining u to v such that Q/sub 1/ /spl cup/ Q/sub 2/ spans S/sub n/ and l(Q/sub i/) /spl les/ n!/2 + l for i = 1,2.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114450226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1